06-07-2023 08:27 AM
I am doing a vulnerability scan of our NGFW 1120 and I am able to see the unsecure site that shows the IP and VPN login - is there a way that we can disable the access to the unsecure side and only allow the SSL connection to be visible?
Thank you
Solved! Go to Solution.
06-09-2023 05:57 AM - edited 06-09-2023 08:01 AM
"Not secure", when shown in a browser toolbar like you shared, usually means the certificate common name (or subject alternate name) does not match the FQDN you scanned. For instance, scanning using the IP address instead of the FQDN will usually show such output.
For a better scanning option, I typically use ssllabs.com server test here: https://www.ssllabs.com/ssltest/
06-07-2023 08:32 AM
can you more elaborate?
06-07-2023 10:06 AM - edited 06-08-2023 08:04 AM
I am scanning the external IP of our Firewall NGFW 1120 - the scan is picking up the IP Address of the vpn, and the secure site of the vpn is good (as expected). Here is the example (below) Is it possible to block the access to this - so that the Secure VPN site is the only accessible site shown. (Screenshot at the bottom)
Secure Site
Thank you
06-09-2023 05:57 AM - edited 06-09-2023 08:01 AM
"Not secure", when shown in a browser toolbar like you shared, usually means the certificate common name (or subject alternate name) does not match the FQDN you scanned. For instance, scanning using the IP address instead of the FQDN will usually show such output.
For a better scanning option, I typically use ssllabs.com server test here: https://www.ssllabs.com/ssltest/
09-26-2023 01:55 PM
I would like to make sure the Firewall does not show the unsecure site. I would like the Secure Site with the Cert to be the only one available.
Thank you
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide